RISK ASSESSMENT FOR BIG DATA IN CLOUD COMPUTING ENVIRONMENT FROM THE PERSPECTIVE OF SECURITY, PRIVACY AND TRUST

Authors:

Anitha Vemulapalli,Nandula Anuradha,Geeta Mahadeo Ambildhuke,

DOI NO:

https://doi.org/10.26782/jmcms.2020.08.00036

Keywords:

Cloud computing,big data, privacy,security,

Abstract

In the cloud service situation, the planning, as well as also details, is shifting into the cloud, leading to the lack of trust between clients as well as additionally cloud business. Possessing claimed that the present research on Cloud computing is mainly concentrated on the service side. At the same time, the data securities, as well as trust, have undoubtedly not been adequately looked into yet. This paper checks out into the information security issues from the info life cycle, which includes five steps when a firm makes use of Cloud computing. An info management framework is given out, featuring certainly not merely the data classification having said that also the hazard administration framework.

Refference:

I. D. Deepika, a Krishna Kumar, MonelliAyyavaraiah, Shoban Babu Sriramoju, “Phases of Developing Artificial Intelligence and Proposed Conversational Agent Architecture”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-12, October 2019, DOI: 10.35940/ijitee.L3384.1081219
II. Kiran Kumar S V N Madupu, “Challenges and CloudComputing Environments Towards Big Data”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Online ISSN: 2394-4099, Print ISSN: 2395-1990, Volume 1 Issue 1, pp. 203-208, 2014. Available at doi :https://doi.org/10.32628/IJSRSET207277
III. Kiran Kumar S V N Madupu, “Tool to IntegrateOptimized Hardware and Extensive Software into Its Database to Endure Big Data Challenges”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume 5, Issue 5, pp. 272-279, September-October 2019. Available at doi : https://doi.org/10.32628/CSEIT206275
IV. Kiran Kumar S V N Madupu, “Key Methodologies for Designing Big Data Mining Platform Based on CloudComputing”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume 1 Issue 2, pp. 190-196, September-October 2016. Available at doi : https://doi.org/10.32628/CSEIT206271
V. Kiran Kumar S V N Madupu, “Opportunities and Challenges towards Data Mining with Big Data”, International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN: 2395-602X, Print ISSN: 2395-6011, Volume 1 Issue 3, pp. 207-214, July-August 2015. Available at doi : https://doi.org/10.32628/IJSRST207255

VI. Kiran Kumar S V N Madupu, “A Survey on Cloud Computing Service Models and Big Data Driven Networking”, International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN: 2395-602X, Print ISSN: 2395-6011, Volume 4 Issue 10, pp. 451-458, September-October 2018. Available at doi : https://doi.org/10.32628/IJSRST207257
VII. Kiran Kumar S V N Madupu, “Data Mining Model for Visualization as a Process of Knowledge Discovery”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, ISSN: 2278 – 8875, Vol. 1, Issue 4, October 2012.
VIII. Kiran Kumar S V N Madupu, “Advanced Database Systems and Technology Progress of Data Mining”, International Journal of Innovative Research in Science, Engineering and Technology, ISSN: 2319 – 8753, Vol. 2, Issue 3, March 2013
IX. Kiran Kumar S V N Madupu, “Functionalities, Applications, Issues and Types of Data Mining System”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 8, August 2017
X. Lowensohn, J. & McCarthy, C. (2009). Lessons from Twitter’s Security Breach. Available online at: http://news.cnet.com/8301-17939_109-10287558-2.html (Accessed on: November 29, 2012).
XI. Microsoft Security Bulletin MS07-049. Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege (937986). URL: http://www.microsoft.com/technet/security/bulletin/ms07- 049.mspx. (November 13, 2007) (Accessed on November 20, 2012).
XII. Monelli and S. B. Sriramoju, “An Overview of the Challenges and Applications towards Web Mining,” 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, India, 2018, pp. 127-131. doi: 10.1109/I-SMAC.2018.8653669
XIII. Molnar, D. & Schechter, S. (2010). Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. In Proceedings of the Workshop on the Economics of Information Security, 2010, Harvard University, USA, June 2010.
XIV. PushpavathiMannava, “An Overview of Cloud Computing and Deployment of Big Data Analytics in the Cloud”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Online ISSN: 2394-4099, Print ISSN: 2395-1990, Volume 1 Issue 1, pp. 209-215, 2014. Available at doi : https://doi.org/10.32628/IJSRSET207278

XV. PushpavathiMannava, “Role of Big Data Analytics in Cellular Network Design”, International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN: 2395-602X, Print ISSN: 2395-6011, Volume 1 Issue 1, pp. 110-116, March-April 2015. Available at doi :https://doi.org/10.32628/IJSRST207254
XVI. PushpavathiMannava, “A Study on the Challenges and Types of Big Data”, “International Journal of Innovative Research in Science, Engineering and Technology”, ISSN(Online) : 2319-8753, Vol. 2, Issue 8, August 2013
XVII. PushpavathiMannava, “Data Mining Challenges with Bigdata for Global pulse development”, International Journal of Innovative Research in Computer and Communication Engineering, ISSN(Online): 2320-9801, vol 5, issue 6, june 2017
XVIII. Pushpa Mannava, “Big Data Analytics in Intra-Data Center Networks and Components Of Data Mining”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume 1 Issue 3, pp. 82-89, November-December 2016. Available at doi : https://doi.org/10.32628/CSEIT206272
XIX. PushpavathiMannava, “Research Challenges and Technology Progress of Data Mining with Bigdata”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume5 Issue 4, pp. 08-315, July-August 2019. Available at doi : https://doi.org/10.32628/CSEIT206274
XX. Security Tracker. VMWare Shared Folder Bug Lets Local Users on the Guest OS Gain Elevated Privileges on the Host OS. Security Tracker ID: 1019493. URL: http://securitytracker.com/id/1019493 (Accessed on: November 20,2012)
XXI. Xen Vulnerability. URL: http://secunia.com/advisories/26986/. (Accessed on: November 20, 2012).
XXII. Zetter, K. (2010). Google hackers Targeted Source Code of More Than 30 Companies. Wired Threat Level. January 13 2010. Available online at: http://www.wired.com/threatlevel/2010/01/google-hack- attack/ (Accessed on: November 29, 2012).

View Download